Study of symmetry in Constraint Satisfaction Problems? Belaid Benhamou. URA CNRS Universite de Provence,
|
|
- Cameron White
- 6 years ago
- Views:
Transcription
1 Study of symmetry in Constraint Satisfaction Problems? Belaid Benhamou URA CNRS Universite de Provence,,Place Victor Hugo - F11 Marseille cedex, France phone number : Benhamou@gyptis.univ-mrs.fr Abstract. Constraint satisfaction problems (CSP's) involve nding values for variables subject to constraints on which combinations of values are permitted. Symmetrical values of a CSP variable are in a sense redundant. Their removal will simplify the problem space. In this paper we give the principle of symmetry and show that the concept of interchangeability introduced by Freuder, is a particular case of symmetry. Some symmetries can be computed eciently thanks to the structure of the problem (neighborhood interchangeability is a kind of these symmetries). Therefore we show how such symmetries can be used by existing constraint propagation algorithms and introduce a backtrack procedure exploiting symmetries. Both theoritical analysis and expiriments indicate that our proposed approach is an improvment of neighborhood interchangeability use, and has very good behavior for pigeon-hole problems. 1 Introduction The nite domain constraint satisfaction problem (CSP) 2 is well known in Articial Intelligence. It has been investigated in the 2 Through out this paper, we use CSP to refer to the nite domain constraint satisfaction problem. past by a number of researchers in dierent contexts; and steal a well-studied research area of recent years (refer to Kumar [1]). A CSP involves, (1) a (nite) set V = fv 1 ; v 2 ;... ; v n g of variables, (2) a - nite set D = fd 1 ; D 2 ;... ; D n g of discret domain values in which D i is the nite discrete domain associated whith the variable v i ; to avoid confusions between values of dierent domains, d i will denote the fact that it belonges to the domain D i, () a nite set C = fc 1 ; c 2 ;... ; c n g of constraints, a k-ary constraint c i is dened on a subset V k V of variables which we denote var(c i ), (4) and a nite set R = fr 1 ; R 2 ;... ; R n g of relations corresponding to the constants in C, R i represents the list of tuples form in which the tuples of values satisfying the constraint c i are enumerated. Thus, a CSP can be seen as a quadriplet P(V; D; C; R). A value assignment is a mapping which species a value for each variable: formally a value assignment I can be seen as: I : V! [ i2[1;n]d i such that I[v i ] 2 D i, 8i 2 [1; n]. A value assignment satises a constraint if it gives a combination of values to variables that is permitted by the constraint; otherwise it falsies it. Thus a constraint satisfaction problem is the task of nding one or all value assignments for the constraints network such that all the constraints are satised together. As beeing expected, various techniques for solving CSP's have been developed; these include backtraking, arc consistancy (Waltz [1], Mackworth [11]), path consistan-
2 cy (Freuder [6] On other hand, symmetries for boolean constraints are well studied in (Benhamou and Sais [2,]). They showed that it is a real improvment for eciency of several automated deduction algorithms. In this paper we develop the concept of symmetry for CSP's. Symmetrical domain values will be in a sense redundant. Their removal will simplify the problem search space. On other hand the set of solution of a CSP can be represented in a more compact way using symmetry. Indeed only non-symmetrical solutions are computed (basical solutions) from which we process the other solutions whitout duplication of eorts. The paper is organized as following : Two levels of semantic symmetry are de- ned in Section 2. Section discusses syntactical symmetry which is a form of semantic symmetry that can be computed eciently using only the structure of the considered problem. In other words, syntactical symmetry is considered as a susient condition to hold semantic symmetry (Neighborhood interchangeability (Freuder [7]) is a case of syntactical symmetry). Section 4 explains how symmetrical values can be used in various algorithms such as propagation methods and propose a backtrack procedure taking advantage of symmetrical values. In section 5 we evaluate the proposed techniques by experimental results. Section 6 concludes the work. For simplicity we studie binary CSP's, which involve only constraints between two variables. However, symmetry remains available for non-binary CSP's; and non-binary CSP's can be transformed into binary ones (Rossi, Dhar and Petri [12]). 2 Semantic symmetry We are interested by two problems in CSP's : the problem of nding a solution (test of satisability) and the problem of ndind all the solutions of the CSP. Thus two levels of semantic symmetry are dined whith respect to the two previous problems. Denition 1 Symmetry for satisability. Two domain values b i and c i for a CSP variable v i 2 V are symmetrical for satisability (notation b i c i ) i the following assertions are equivalent : 1. There is a solution of the CSP which contains the value b i ; 2. There is a solution of the CSP which contains the value c i. Domain values can be not only symmetrical for satisability (denition 1) but symmetrical for the set of all solutions as well. Thus, if sol(p) denotes the set of solutions of the CSP P, then we dene a second level of semantic symmetry as follow : Denition 2 Symmetry for all solutions. Two domain values b i and c i for a CSP variable v i 2 V are symmetrical for sol(p) (notation b i ' c i ) if and only if each solution of the CSP containing the value b i can be mapped into a solution containing the value c i and viceversa. Remark. Symmetrical values for all solutions (denition 2) are also symmetrical values for satisability (denition 1). Example 1 Graph coloring problem. The problem consists in coloring the vertices so that no two vertices which are joined by an edge have the same color. The available colors (domain values) at each vertex are shown (gure 1). The red 1 and white 1 colors for vertex v 1 are two symmetrical domain values. Indeed, solutions in which one of them participates, can
3 be obtained from the solutions in which the other value appears by permuting the values red and white for the variables v 1, v 2 and v. sucient condition to hold semantic symmetry (denition 2) and give an ecient method for search of such symmetries. v1 red, white c1 Syntactical symmetry marroon, red, white v Identiying semantic symmetries as dined in c12 c4 (denitions 1 and 2) is straightforward time consoming, as this requires solving the problem. This section studies a family of symmetries (syntactical symmetries) which are v2 blue, red, white blue v4 c24 more tractable computationally, thanks to the structures of the considered problem. Fig. 1. The graph coloring problem. A permutation of domain values of a binary CSP P = (V; D; C; R) can be seen In other hand, Freuder introduced in ([7]) as: : [ i2[1;n]d i! [ i2[1;n]d i, such that (d i ) 2 D i, 8i 2 [1; n] and 8d i 2 D i. The the notion of interchangeability, where two domain values are interchangeable in some en- fv; D; Cg of the CSP P. However, it induces permutation have no inuence on the sets veronment, if they can be substituted for each a permutation t on the tuples in each relation other without any eects to the environment. R ij 2 R and then a permutation R on the Let us summarize the main denition. relations themselves. Therefore a syntactical symmetry of a CSP P = (V; D; C; R) is a permutation of domain values which leaves the CSP P invariant (i.e. R (R i ) = R i ; 8R i 2 R). Formally: Denition. Two domain values b i and c i for a CSP variable v i 2 V are fully interchangeable i (1) every solution to the CSP which contains b i remains a solution when c i is substituted for b i, (2) every solution to the C- SP which contains c i remains a solution when b i is substituted for c i. Remark. Interchangeable values are particular symmetrical values for all solutions in which the mapping consists to permute the interchangeable values and still identity for the other values. In the previous examples, values red 1 and white 1 are not interchangeable. Thus, the principle of symmetry seems to be more general than the notion of interchangeability. Therefore, eliminating symmetrical values can prune more great deal of eort from a backtrack search tree if such values are processed eciently. We study in the next section syntactical symmetry of domain values which is a Denition 4 Syntactical symmetry. A permutation is a syntactical symmetry of the CSP P = (V; D; C; R) i [8R ij 2 R, d i ; d j 2 tuples(r ij ) ) (d i ); (d j ) 2 tuples(r ij )]. Remark. A syntactical symmetry of a CSP is a domain value permutation such that R (R i ) = R i, 8R i 2 R. Example 2 Pigeon-hole problem. The problem consists in putting n pigeons in n1 holes such that each hole holds at most one pigeon. Take for instance 4 pigeons and holes. The pigeons are represented by the set of variables the holes by the domain values, as it was shown Both t resp. R are natural generalizations for to tuples resp. relations.
4 in the constraint graph of gure 2, the constraint c 1 is given in its microstructure form showing the permitted tuples in the relation R 1. v2 c12 a b c24 c14 v1 a b c J@ L@ AS JJ LL@@ AA SS v4 c2 a b c S JJ SS c4 c1 c b a Fig. 2. Pigeon-hole problem for 4 pigeons and holes. The permutation dened as: (a i ) = (b i ), (b i ) = (c i ), (c i ) = (a i ), 8i 2 [1; 4] keeps the CSP invariant (i.e. R (R i ) = R i, 8i 2 [1; 4]). Thus, it is a symmetry of the CSP. Denition 5. Two domain values b i and c i for a CSP variable v i 2 V are syntactically symmetrical (notation b i c i ) if there exists a syntactical symmetry of the CSP P such that (b i ) = c i. Remark. The relation () is a relation of e- quivalence. In the previous example domain values a 1 and b 1 of the variable v 1 are syntactically symmetrical. Denition 6. A set fa 1 ; ;... ; 1 a2 an g of domain values form a cycle of symmetry in 1 1 P, if there exists a syntactical symmetry of P such that (a 1 1) = a 2 ; 1 1) = (a2 a ;... ; ) = a n ; 1 (an1 (an 1 1 1) = a 1 1 v Example. The sets of values fa i ; b i ; c i g, i 2 [1; 4] of the previous example forme four cycles of symmetry. All values in a cycle of symmetry are symmetrical two by two. Therefore, our method of search of symmetry will process a symmetry which gives for each domain, classes (cl(d i ) denotes the class of d i ) of values which are symmetrical together. Each classe will be identi- ed by a cycle of symmetry. Before, describing the search method of symmetry, we will prove that syntactical symmetry is a sucient condition for semantic symmetry. Theorem 7. If b i and c i are two syntactical symmetrical values of a CSP variable v i 2 V (b i c i ) then b i and c i are semantic symmetrical values for all solutions of the CSP (b i ' c i ). Proof. Cf. ([1]). Remark. Syntactical symmetrical values are also semantic symmetrical values. Symmetry expresses an important property that we use to make prune the search tree. Indeed if d i participates in no soliution of the CSP P and d i d i, then d i will participate in no solution too. Thus, we prune the sub-tree which corresponds to its assignment. Therefore, if there are n symmetrical domain values in cl(d), then we can cut n1 branches in the search tree if one of the domain values has already been identied that it paticipates in no solutions. See that neighborhood interchangeability is a very particular syntactical symmetry which permuts the interchangeable values and still identity for the other values. Such symmetries can not exists frequentlly. Our approache is more general and will get more use. Bellow we give the search method for syntactical symmetry.
5 .1 Search method for symmetry To be syntactically symmetrical, values need to satisfy some necessary conditions: Proposition 8. Let Rij (d i ) be the number of occurences of the value d i 2 D i in the relation R ij and tuples(r di ) ij the set of tuples of R ij in which d i appears, then to be syntactically symmetrical, values b i and c i must satisfy the following conditions: 1. Rij (b i ) = Rij (c i ), 8R ij 2 R; 2. for each d j 2 tuples(r bi ij ), 9 d j 2 tuples(r ci ij ) such that Rij (d j ) = Rij ( d j ), 8R ij 2 R. Proof. Cf. ([1]). The search method consits in two steps: (I) to partition each domain w.r.t the previous necessary conditions into primary classes of values which will be condidates for symmetry. (II) process a permutation from the primary classes which keeps the CSP invariant. We develope the step (II) which will give the complexity of the search method. procedure symmetry(d i 2 D) Repeat for each R ij 2 R: Repeat for each d i 2 D i, such that d i; d j 2 tuples(r ij): choose (d i) 2 cl(d i) and (d j) 2 cl(d j), such that (d i); (d j) 2 tuples(r ij) Fig.. The search symmetry algorithm The classes of symmetrical values are the dierent sycles of. A complexity bound for this algorithm can be found by assigning a worst case bound to each repeat loop. Given m relations, at most a values in each domain variable, we have the bound (the factors correspond to the repeat loops and the choose operation in topdown order): O(m a a 2 ) = O(m:a ). Bellow we show how several methods can be augmented with the advantage of symmetry. 4 Adaptation of various Constraints Propagation Algorithms Now we are in the position to show how these domain symmetrical values can be used to increase eciency of various existing algorithms. We give a few modications of the key procedures and show the advantages of the use of symmetry techniques for certain problem types. We focus on binary CSPs. 4.1 Constraint ltering algorithms The critical and most time consuming task in network consistency procedures is to check if all values of a particular variable domain can potentially be a member of a solution. These checks are done repetitively for singular variables w.r.t singular constrains. In the case of binary constraints, the procedure revise(d i,d j ) is usually used. It removes all values of D i for which no value of the domain D j can be found such that the binary constraint c ij between variables v i and v j is satised. It is abvious that the worst-case complexity of revise is O(a 2 ) where a is the maximum domain size. The procedure revise is applied on dierent constraints seperatelly, then symmetrical domain values must be computed w:r:t a given constraint c. The main idea is that domain values can be symmetrical w:r:t a constraint c, but not symmetrical w:r:t other constraints. So it is important to caracterize symmetrical values for each constraint of the network independently. We use the expression cl(d) v c (d is a domain value of the CSP variable v 2 var(c)) to denote the equivalence class of symmetrical values w:r:t to the constraint c in which d appears; formally: cl(d) v c =fd 2 D v : d dg. Figure 4 shows the procedure revise augmented by the advantage of symmetry.
6 procedure revise SV (var D i:domain,d j:domain) begin 4 i = fg repeat x := an element of D i 4 j = D j repeat y := an element of 4 j if x; y 2 tuples(r ij) then begin end 4 i := 4 i S fcl(x) v i c ij 4 j =f g end else 4 j := 4 j-fcl(y) v j until(4 j =f g) D i := D i fcl(x) v i until (D i =f g) D i := 4 i Fig.4. The revise SV c ij g algorithm. c ij g \ D ig The main dierence between the classical revise and revise SV is that the former checks in the worst case all tuples D i 2 D j and the later treats groups of symmetrical values e- qually. A symmetry dened on a constraint c partionnes the domain D i into subsets of domain values which are symmetrical together. If 5 v c is the set of symmetrical subsets domain values of the variable v 2 var(c), w:r:t the constraint c, if we assume that the sets 5c v for all constraint c and all variables v 2 var(c) are of size a (1 a a), then a worst case bound of the algorithm revise SV is O(a 2 ). 4.2 Backtrack search In the following, we want to envolve a tree search scheme where symmetrical search branches are recognized by use of symmetrical values. The algorithm is basically the same as classical backtrack tree search as discribed, for instance in ( Fox and Nadel [5]). But rst we have to give some notations we need for the development of the search procedure. Each output of a traditional backtrack procedure is an assignment tuple representing a solution for the given CSP. Because we want to handle groups of symmetrical values, we have to modify the form of the output. Instead of single assignment values, sets are used. As it was done in ([9]), assignment tuples are chifted to assignment bundles. Denition 9 Assignment Bundle. Let V be the set of n variables of the CSP P. An n-tuple 4 where the ith element (1 i n) is a non-vacuous subset of the domain D i is called an assignment bundle. Denition 1 Solution Bundle. Let sol(p) be the set of all solution of the CSP P. An assignment bundle 4 = f4 1 ;... ; 4 n g on the variables V of the CSP is said to be a solution bundle, if and only if n sol(p). Solutions bundle represent then groups of paths throught the search tree, which are solutions of the CSP. The terms of local and global consistency (see, for instance Dechter[4]) can be extended to assignment bundles. Denition 11. { An assignment bundle 4 p on the variables V p V is said to be locally consistent, if every assignment tuple extractable from 4 p is locally 4, consitent; { An assignment bundle 4 p on the variable V p V is said to be globally consistent, if there exists an extention assignment bundle 4 e on the variables (V V p ) such that 4 p [ 4 e is a solution bundle; { An assignment bundle 4 p is said to be inconsistent, if every assignment tuple extractable from 4 p is inconsistent (i.e., no tuple in 4 p can be extended to a solution). Now we modify the classical backtrack search such that for each pass a bundle assignment is computed. Solutions bundle regroup 4 I.e., all the constraints of the subnetwork de- ned by the variables V p are satised.
7 sets of symmetrical solutions. The following theorem gives the fundamental basis for the utilisation of symmetrical values. Theorem 12. Let 4 p be an assignment bundle on the variables V P V which is either globally consistent or inconsistent. Let v be a variable of V V p, v D v and C k all binary constraints from v to variables of (V V p ), such that the two following two conditions hold : will test both interchangeability and symmetry and compare them on two kind of problems: (I) randomlly generated CSP's, we use the same test model as proposed in Freuder ([8]). (II) the pigeon-hole problem which is known to be hard, is solved using symmetries with a linear complexity, however interchangeability get no use for this problem p + v is locally consistent; 2. 8d 1 ; d 2 2 v : 8c 2 C k ; d 1 d 2. Then 4 p + v is either globally consistent or inconsistent. Proof. Cf. ([1]) Random CSP's are characterized by the following four parameters: (1) n, the number of procedure backtrack SV (k:integer,b:assign-bundle); variables. (2) a, the maximum domain size. () begin t, the constraint tightness which is the fraction revise SV (D k; D p), for 1 p < k; of forbidden tuples to the number of possible for do some kind of look ahead ltringg d k := D k; repeat tuples. (4) the constraint density which is a number between and 1 given by d, indicates the fraction of additional constraints. x := an element of D k; C f := all constraints on v k to future variables; B[k] := ( cl(x) v k c2c f c ) \ d k; d k := d k B[k] if k = n then write(b) else backtracking SV (k + 1; B); until (d k = fg); 5.2 Results end. Fig.5. The backtrack algorithm. The advantageous behavior of the procedure backtracking SV is that symmetrical search branches are bundled and visited once. If a dead-end occurs, all the partial assignment extractable frome the derived assignment bundle are proven to be coniting. 5 experiments Now we want to invistigate the indicated performance improvement of our augmented search technique by experimental analysis. We 5.1 The experiment model Three forward-checking search procedures are compared: (1) (F C), the classical forwardchecking. (2) (F C N I), forward-checking with the advantage of neighborhood interchangeability seen as particular syntactical symmetry. () (F C SV ), the instance of the search scheme backtracking SV (see, gure 5) where forward-cheking ltring is used. The indicator of the complexity is the number of checks. Of cours, the checks needed for the computation of neighborhood interchangeability resp. symmetry are added to the run time checks. The samples of each test are randomly generated CSP's.
8 14 12 FC 1 FC-NI 8 FC-SV FC-SV Fig.6.Symmetry eects w.r.t the number of variables It can be seen in gure 6 that the eect of both symmetry and interchangeability grows if the problem increase. The variable size steps from 6 to 1, a is xed on 5, t and d are from the interval [.1-.4] (the protable ranges for the use of interchangeability as claimed in [8]). It can also be seen that F C SV denitily beats F C N I at these problems type FC FC-NI FC-SV Fig.7. FC and FC-NI eects on Pigeon-hole problem. Figure 8 shows that the complexity of F C SV for pigeon-hole problem seems to be linear, whereas both F C and F C N I (gure 7) cannot solve the problem when the number of pigeons is greater than eight, their complexities become quickly exponentiel when the number of pigeons is greater then 8. Thus, neighborhood interchangeability get no use for this problem. Fig.8. Symmetry eects on pigeon-hole problems. 6 Conclusion We have developed the formal cocept of symmetry in constraint satisfaction problems, then various constraintes satisfaction algorithmes can be adapted to exploit such information. The principe of interchangebility is shown to be a particular case of symmetry. Further investigation will consist to extend symmetry to domain values of dierent variables and try to identify certain type of C- SP's for which such symmetries get more use. References 1. B. Benhamou. Study of symmetry in constraint satisfaction problems. Technical Report 1, Universite de provence, B. Benhamou and L. Sais. Tractability through symmetries in propositional calculus. Journal of Automated Reasoning (JAR), to a- pear.. B. Benhamou and L. Sais. Theoretical s- tudy of symmetries in propositional calculus and application. Eleventh International Conference on Automated Deduction, Saratoga Springs,NY, USA, R. Dechter. From local to global consistency. Articial Intelligence, 55, pages 87{17, 1992.
9 5. M. Fox and B. Nadel. Constraint satisfaction directed reasoning. Tutorials of IJCAI-89, E. Freuder. Backtrack-free and backtrack bounded search. In Kanal, Laveen and Kumar, Vipin, editors 1988, Search in Articial Intelligence. Springer-Verlag, New York., E. Freuder. Eliminating interchangeable values in constraints satisfaction problems. Proc AAAI-91, pages 227{2, E. Freuder and W. Benson. Interchangeability preprocessing can improve forward checking search. In proc. ECAI, A. Haselbock. Exploiting interchangeability in constraint satisfaction problems. In Proceedings of IJCAI, pages 282{287, V. Kumar. Algorithms for constraints satisfaction problems. AI Magazine, pages 2{44, A. Mackworth. Consistency in networks of relations. Articial Intelligence 8, pages 99{ 118, D. Rossi and Petrie. On the equivalence of constraint satisfaction problems. Technical report, MCC Technical Report ACT-AI MCC, Austin, Texas 78759, D. Waltz. Understanding line drawings of scenes with shadows. In Winston, P.H., editor, the Psychology of Computer Vision. Mc- Graw Hill, Cambridge, MA, This article was processed using the LaT E X macro package with LLNCS style
Symmetries in CSP. Symmetries in CSP. Elena Sherman UNL, CSE. April 18, 2009
Symmetries in CSP Elena Sherman UNL, CSE April 18, 2009 Table of contents Why Symmetry? Symmetry Examples Adding symmetry-breaking global contraints Search space modification Heuristics modification Historical
More informationStatistical Analysis of Backtracking on. Inconsistent CSPs? Irina Rish and Daniel Frost.
Statistical Analysis of Backtracking on Inconsistent CSPs Irina Rish and Daniel Frost Department of Information and Computer Science University of California, Irvine, CA 92697-3425 firinar,frostg@ics.uci.edu
More informationA new Evaluation of Forward Checking and its Consequences on Efficiency of Tools for Decomposition of CSPs
2008 20th IEEE International Conference on Tools with Artificial Intelligence A new Evaluation of Forward Checking and its Consequences on Efficiency of Tools for Decomposition of CSPs Philippe Jégou Samba
More informationThe Extendable-Triple Property: a new CSP Tractable Class beyond BTP
The Extendable-Triple Property: a new CSP Tractable Class beyond BTP Philippe Jégou and Cyril Terrioux Aix-Marseille Université, CNRS LSIS UMR 7296 Avenue Escadrille Normandie-Niemen 13397 Marseille Cedex
More informationGeneralized Micro-Structures for Non-Binary CSP
Generalized Micro-Structures for Non-Binary CSP Achref El Mouelhi LSIS - UMR CNRS 7296 Aix-Marseille Université Avenue Escadrille Normandie-Niemen 13397 Marseille Cedex 20 (France) achref.elmouelhi@lsis.org
More informationSymmetry Definitions for Constraint Satisfaction Problems
Symmetry Definitions for Constraint Satisfaction Problems David Cohen 1, Peter Jeavons 2, Christopher Jefferson 3, Karen E. Petrie 4, and Barbara M. Smith 4 1 Department of Computer Science, Royal Holloway,
More informationAn Alternative To The Iteration Operator Of. Propositional Dynamic Logic. Marcos Alexandre Castilho 1. IRIT - Universite Paul Sabatier and
An Alternative To The Iteration Operator Of Propositional Dynamic Logic Marcos Alexandre Castilho 1 IRIT - Universite Paul abatier and UFPR - Universidade Federal do Parana (Brazil) Andreas Herzig IRIT
More informationRina Dechter and Irina Rish. Information and Computer Science. University of California, Irvine.
Directional Resolution: The Davis-Putnam Procedure, Revisited 3 Rina Dechter and Irina Rish Information and Computer Science University of California, Irvine dechter@ics.uci.edu, irinar@ics.uci.edu Abstract
More informationDynamic symmetry detection and elimination for the satisfiability problem
Dynamic symmetry detection and elimination for the satisfiability problem Belaïd Benhamou and Tarek Nabhani and Richard Ostrowski and Mohamed Réda Saïdi Laboratoire des Sciences de l Information et des
More informationSplitting a Default Theory. Hudson Turner. University of Texas at Austin.
Splitting a Default Theory Hudson Turner Department of Computer Sciences University of Texas at Austin Austin, TX 7872-88, USA hudson@cs.utexas.edu Abstract This paper presents mathematical results that
More informationA Preference Semantics. for Ground Nonmonotonic Modal Logics. logics, a family of nonmonotonic modal logics obtained by means of a
A Preference Semantics for Ground Nonmonotonic Modal Logics Daniele Nardi and Riccardo Rosati Dipartimento di Informatica e Sistemistica, Universita di Roma \La Sapienza", Via Salaria 113, I-00198 Roma,
More informationComputing the acceptability semantics. London SW7 2BZ, UK, Nicosia P.O. Box 537, Cyprus,
Computing the acceptability semantics Francesca Toni 1 and Antonios C. Kakas 2 1 Department of Computing, Imperial College, 180 Queen's Gate, London SW7 2BZ, UK, ft@doc.ic.ac.uk 2 Department of Computer
More informationExploiting a Theory of Phase Transitions in Three-Satisability. Problems. David M. Pennock and Quentin F. Stout. University ofmichigan
Exploiting a Theory of Phase Transitions in Three-Satisability Problems David M. Pennock and Quentin F. Stout Electrical Engineering and Computer Science Department University ofmichigan Ann Arbor, MI
More informationExtremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi
Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department University of Kentucky Lexington, KY 40506-0046 fpaweljmirekg@cs.engr.uky.edu
More informationConstraint Satisfaction 101
Constraint Satisfaction 101 Berthe Y. Choueiry (Shu-we-ri) Nov 14, 2006 Constraint Satisfaction 101 1 Constraint Processing Constraint Satisfaction Computational problem Constraint Satisfaction Problem
More informationOn Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus
On Controllability and Normality of Discrete Event Dynamical Systems Ratnesh Kumar Vijay Garg Steven I. Marcus Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin,
More informationAnalyzing a Heuristic Strategy. for Constraint-Satisfaction and Scheduling. Mark D. Johnston and Steven Minton. Abstract
Analyzing a Heuristic Strategy for Constraint-Satisfaction and Scheduling Mark D. Johnston and Steven Minton Abstract This paper describes a simple heuristic approach to solving large-scale constraint
More informationproblems from this class. For each combination algorithm C, and for each actual size s, we can dene the worst-case computation time T (C; s) of the co
From Planning to Searching for the Shortest Plan: An Optimal Transition Le Chi Tuan, Joel Galloway Charanjiv Sachar, Vladik Kreinovich Department of Computer Science University of Texas at El Paso El Paso,
More informationand combine the results of the searches. We consider parallel search with subdivision, although most notions can be generalized to using dierent searc
On the representation of parallel search in theorem proving Maria Paola Bonacina Department of Computer Science { The University of Iowa Abstract This extended abstract summarizes two contributions from
More informationExtending temporal logic with!-automata Thesis for the M.Sc. Degree by Nir Piterman Under the Supervision of Prof. Amir Pnueli Department of Computer
Extending temporal logic with!-automata Thesis for the M.Sc. Degree by Nir Piterman Under the Supervision of Prof. Amir Pnueli Department of Computer Science The Weizmann Institute of Science Prof. Moshe
More informationAn average case analysis of a dierential attack. on a class of SP-networks. Distributed Systems Technology Centre, and
An average case analysis of a dierential attack on a class of SP-networks Luke O'Connor Distributed Systems Technology Centre, and Information Security Research Center, QUT Brisbane, Australia Abstract
More informationConstraint-based Optimal Testing Using DNNF Graphs
Constraint-based Optimal Testing Using DNNF Graphs Anika Schumann 1, Martin Sachenbacher 2, and Jinbo Huang 3 1 Cork Constraint Computation Centre, University College Cork, Ireland 2 Institut für Informatik,
More informationA Hybrid Tractable Class for Non-Binary CSPs
A Hybrid Tractable Class for Non-Binary CSPs Achref El Mouelhi Philippe Jégou Cyril Terrioux LSIS - UMR CNRS 7296 Aix-Marseille Université Avenue Escadrille Normandie-Niemen 13397 Marseille Cedex 20 (France)
More informationArtificial Intelligence
Artificial Intelligence Constraint Satisfaction Vibhav Gogate The University of Texas at Dallas Some material courtesy of Rina Dechter, Alex Ihler and Stuart Russell Constraint Satisfaction Problems The
More informationSTGs may contain redundant states, i.e. states whose. State minimization is the transformation of a given
Completely Specied Machines STGs may contain redundant states, i.e. states whose function can be accomplished by other states. State minimization is the transformation of a given machine into an equivalent
More informationWeak ω-automata. Shaked Flur
Weak ω-automata Shaked Flur Weak ω-automata Research Thesis Submitted in partial fulllment of the requirements for the degree of Master of Science in Computer Science Shaked Flur Submitted to the Senate
More informationIntroduction to Arti Intelligence
Introduction to Arti Intelligence cial Lecture 4: Constraint satisfaction problems 1 / 48 Constraint satisfaction problems: Today Exploiting the representation of a state to accelerate search. Backtracking.
More informationThe Constrainedness Knife-Edge. Toby Walsh. APES Group. Glasgow, Scotland.
Abstract A general rule of thumb is to tackle the hardest part of a search problem rst. Many heuristics therefore try to branch on the most constrained variable. To test their eectiveness at this, we measure
More informationWojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.
A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,
More informationMaking Bound Consistency as Effective as Arc Consistency
Proceedings of the Twenty-First International Joint Conference on Artificial Intelligence (IJCAI-09) Making Bound Consistency as Effective as Arc Consistency Christian Bessiere LIRMM-CNRS U. Montpellier,
More informationTransformation Rules for Locally Stratied Constraint Logic Programs
Transformation Rules for Locally Stratied Constraint Logic Programs Fabio Fioravanti 1, Alberto Pettorossi 2, Maurizio Proietti 3 (1) Dipartimento di Informatica, Universit dell'aquila, L'Aquila, Italy
More informationconstraints with more parsimony and makes the encodings more economical, either by reducing the number of clauses or variables or both. [Kautz & Selma
Frugal Propositional Encodings for Planning Amol D. Mali, Subbarao Kambhampati Dept. of computer science & Engg. Arizona state university, Tempe, AZ 8587-5406 famol.mali, raog@.asu.edu Abstract Casting
More informationChapter 6 Constraint Satisfaction Problems
Chapter 6 Constraint Satisfaction Problems CS5811 - Artificial Intelligence Nilufer Onder Department of Computer Science Michigan Technological University Outline CSP problem definition Backtracking search
More informationMin-Max Message Passing and Local Consistency in Constraint Networks
Min-Max Message Passing and Local Consistency in Constraint Networks Hong Xu, T. K. Satish Kumar, and Sven Koenig University of Southern California, Los Angeles, CA 90089, USA hongx@usc.edu tkskwork@gmail.com
More informationCounting and Constructing Minimal Spanning Trees. Perrin Wright. Department of Mathematics. Florida State University. Tallahassee, FL
Counting and Constructing Minimal Spanning Trees Perrin Wright Department of Mathematics Florida State University Tallahassee, FL 32306-3027 Abstract. We revisit the minimal spanning tree problem in order
More informationConsistency algorithms
Consistency algorithms Chapter SQ 00 rc-consistency X, Y, Z, T X Y Y = Z T Z X T X,, Y,,,,,, T = Z SQ 00 rc-consistency X, Y, Z, T X Y Y = Z T Z X T X T Y Z = SQ 00 rc-consistency Sound < < Incomplete
More informationAbstract. This paper discusses polynomial-time reductions from Hamiltonian Circuit (HC),
SAT-Variable Complexity of Hard Combinatorial Problems Kazuo Iwama and Shuichi Miyazaki Department of Computer Science and Communication Engineering Kyushu University, Hakozaki, Higashi-ku, Fukuoka 812,
More informationInterpolation theorems, lower bounds for proof. systems, and independence results for bounded. arithmetic. Jan Krajcek
Interpolation theorems, lower bounds for proof systems, and independence results for bounded arithmetic Jan Krajcek Mathematical Institute of the Academy of Sciences Zitna 25, Praha 1, 115 67, Czech Republic
More informationBehavioural theories and the proof of. LIENS, C.N.R.S. U.R.A & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France
Behavioural theories and the proof of behavioural properties Michel Bidoit a and Rolf Hennicker b b a LIENS, C.N.R.S. U.R.A. 1327 & Ecole Normale Superieure, 45 Rue d'ulm, F{75230 Paris Cedex 05, France
More informationArguing and Explaining Classifications
Arguing and Explaining Classifications Leila Amgoud IRIT CNRS 118, route de Narbonne 31062, Toulouse, France amgoud@irit.fr Mathieu Serrurier IRIT CNRS 118, route de Narbonne 31062, Toulouse, France serrurier@irit.fr
More information0 o 1 i B C D 0/1 0/ /1
A Comparison of Dominance Mechanisms and Simple Mutation on Non-Stationary Problems Jonathan Lewis,? Emma Hart, Graeme Ritchie Department of Articial Intelligence, University of Edinburgh, Edinburgh EH
More informationBranching Rules for Minimum Congestion Multi- Commodity Flow Problems
Clemson University TigerPrints All Theses Theses 8-2012 Branching Rules for Minimum Congestion Multi- Commodity Flow Problems Cameron Megaw Clemson University, cmegaw@clemson.edu Follow this and additional
More informationInterleaved Alldifferent Constraints: CSP vs. SAT Approaches
Interleaved Alldifferent Constraints: CSP vs. SAT Approaches Frédéric Lardeux 3, Eric Monfroy 1,2, and Frédéric Saubion 3 1 Universidad Técnica Federico Santa María, Valparaíso, Chile 2 LINA, Université
More informationTransposition Tables for Constraint Satisfaction
Transposition Tables for Constraint Satisfaction Christophe Lecoutre and Lakhdar Sais and Sébastien Tabary and Vincent Vidal CRIL CNRS FRE 2499 Université d Artois Lens, France {lecoutre, sais, tabary,
More informationThree-dimensional Stable Matching Problems. Cheng Ng and Daniel S. Hirschberg. Department of Information and Computer Science
Three-dimensional Stable Matching Problems Cheng Ng and Daniel S Hirschberg Department of Information and Computer Science University of California, Irvine Irvine, CA 92717 Abstract The stable marriage
More informationComputation of Floating Mode Delay in Combinational Circuits: Theory and Algorithms. Kurt Keutzer. Synopsys. Abstract
Computation of Floating Mode Delay in Combinational Circuits: Theory and Algorithms Srinivas Devadas MIT Cambridge, MA Kurt Keutzer Synopsys Mountain View, CA Sharad Malik Princeton University Princeton,
More information1 I A Q E B A I E Q 1 A ; E Q A I A (2) A : (3) A : (4)
Latin Squares Denition and examples Denition. (Latin Square) An n n Latin square, or a latin square of order n, is a square array with n symbols arranged so that each symbol appears just once in each row
More information[3] R.M. Colomb and C.Y.C. Chung. Very fast decision table execution of propositional
- 14 - [3] R.M. Colomb and C.Y.C. Chung. Very fast decision table execution of propositional expert systems. Proceedings of the 8th National Conference on Articial Intelligence (AAAI-9), 199, 671{676.
More informationUpdating Disjunctive Databases via Model. Trees. John Grant. Computer and Information Sciences, Towson State University.
Updating Disjunctive Databases via Model Trees John Grant Computer and Information Sciences, Towson State University Jaros law Gryz Computer Science Department, University of Maryland, College Park Jack
More informationApplications of the Situation Calculus To Formalizing. Control and Strategic Information: The Prolog Cut Operator. Fangzhen Lin
Applications of the Situation Calculus To Formalizing Control and Strategic Information: The Prolog Cut Operator Fangzhen Lin (in@csusthk) Department of Computer Science The Hong Kong University of Science
More informationSymmetries of Symmetry Breaking Constraints
Symmetries of Symmetry Breaking Constraints George Katsirelos NICTA, Sydney, Australia george.katsirelos@nicta.com.au Toby Walsh NICTA and UNSW, Sydney, Australia toby.walsh@nicta.com.au Abstract Symmetry
More informationsignicant in view of the fact that in many applications existential queries are of main interest. It also plays an important role in the problem of nd
On the Relationship Between CWA, Minimal Model and Minimal Herbrand Model Semantics Michael Gelfond Halina Przymusinska Teodor Przymusinski March 3, 1995 Abstract The purpose of this paper is to compare
More informationSymmetry and Consistency
Symmetry and Consistency Ian P. Gent 1, Tom Kelsey 1, Steve Linton 1, Colva Roney-Dougal 1 1 School of Computer Science, University of St Andrews, St Andrews, Fife, KY16 9SX, UK {ipg,tom,sal,colva}@dcs.st-and.ac.uk
More information1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori
Combining Unication- and Disunication Algorithms Tractable and Intractable Instances Klaus U. Schulz CIS, University of Munich Oettingenstr. 67 80538 Munchen, Germany e-mail: schulz@cis.uni-muenchen.de
More informationConsistency algorithms. Chapter 3
Consistency algorithms Chapter Fall 00 Consistency methods pproximation of inference: rc, path and i-consistecy Methods that transform the original network into tighter and tighter representations Fall
More informationBoolean Algebra and Propositional Logic
Boolean Algebra and Propositional Logic Takahiro Kato September 10, 2015 ABSTRACT. This article provides yet another characterization of Boolean algebras and, using this characterization, establishes a
More informationAbstract The paper presents an algorithm called directional resolution, avariation on the
Directional Resolution: The Davis-Putnam Procedure, Revisited 3 Rina Dechter and Irina Rish Information and Computer Science University of California, Irvine dechter@ics.uci.edu, irinar@ics.uci.edu Abstract
More informationPredicates and Predicate Transformers for. Systems 1. Ratnesh Kumar. Department of Electrical Engineering. University of Kentucky
Predicates and Predicate Transformers for Supervisory Control of Discrete Event Dynamical Systems 1 Ratnesh Kumar Department of Electrical Engineering University of Kentucy Lexington, KY 40506-0046 Vijay
More informationTableau Calculus for Local Cubic Modal Logic and it's Implementation MAARTEN MARX, Department of Articial Intelligence, Faculty of Sciences, Vrije Uni
Tableau Calculus for Local Cubic Modal Logic and it's Implementation MAARTEN MARX, Department of Articial Intelligence, Faculty of Sciences, Vrije Universiteit Amsterdam, De Boelelaan 1081a, 1081 HV Amsterdam,
More informationOn a generalization of extended resolution
Discrete Applied Mathematics 96 97 (1999) 149 176 On a generalization of extended resolution O. Kullmann Johann Wolfgang Goethe-Universitat, Fachbereich Mathematik D-60054 Frankfurt, Germany Received 1
More informationLecture 14 - P v.s. NP 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 27, 2018 Lecture 14 - P v.s. NP 1 In this lecture we start Unit 3 on NP-hardness and approximation
More informationContents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces
Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v 250) Contents 2 Vector Spaces 1 21 Vectors in R n 1 22 The Formal Denition of a Vector Space 4 23 Subspaces 6 24 Linear Combinations and
More informationCristani the relation EQ, as dened by Randell, Cui and Cohn (1989), and analogously by Egenhofer and Franzosa (1991), becomes identity under the uniqu
Journal of Articial Intelligence Research 11 (1999) 361-390 Submitted 6/99; published 11/99 The Complexity of Reasoning about Spatial Congruence Matteo Cristani Dipartimento Scientico e Tecnologico, Universita
More informationLinear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space
Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................
More informationSteven Minton 1 Mark D. Johnston 2 Andrew B. Philips 1 Philip Laird 3. NASA Ames Research Center 3700 San Martin Drive, AI Research Branch
Minimizing Conicts: A Heuristic Repair Method for Constraint-Satisfaction and Scheduling Problems Steven Minton 1 Mark D. Johnston 2 Andrew B. Philips 1 Philip Laird 3 1 Sterling Federal Systems 2 Space
More informationMinimal enumerations of subsets of a nite set and the middle level problem
Discrete Applied Mathematics 114 (2001) 109 114 Minimal enumerations of subsets of a nite set and the middle level problem A.A. Evdokimov, A.L. Perezhogin 1 Sobolev Institute of Mathematics, Novosibirsk
More informationThe following can also be obtained from this WWW address: the papers [8, 9], more examples, comments on the implementation and a short description of
An algorithm for computing the Weierstrass normal form Mark van Hoeij Department of mathematics University of Nijmegen 6525 ED Nijmegen The Netherlands e-mail: hoeij@sci.kun.nl April 9, 1995 Abstract This
More information(1.) For any subset P S we denote by L(P ) the abelian group of integral relations between elements of P, i.e. L(P ) := ker Z P! span Z P S S : For ea
Torsion of dierentials on toric varieties Klaus Altmann Institut fur reine Mathematik, Humboldt-Universitat zu Berlin Ziegelstr. 13a, D-10099 Berlin, Germany. E-mail: altmann@mathematik.hu-berlin.de Abstract
More informationClassical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems
Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive
More informationTemporal Reasoning with Constraints. on Fluents and Events 3.
Temporal Reasoning with Constraints on Fluents and Events 3 Eddie Schwalb, Kalev Kask, Rina Dechter Department of Information and Computer Science University of California, Irvine CA 92717 feschwalb,kkask,dechterg@ics.uci.edu
More informationLean clause-sets: Generalizations of minimally. unsatisable clause-sets. Oliver Kullmann. University of Toronto. Toronto, Ontario M5S 3G4
Lean clause-sets: Generalizations of minimally unsatisable clause-sets Oliver Kullmann Department of Computer Science University of Toronto Toronto, Ontario M5S 3G4 e-mail: kullmann@cs.toronto.edu http://www.cs.utoronto.ca/kullmann/
More informationthe subset partial order Paul Pritchard Technical Report CIT School of Computing and Information Technology
A simple sub-quadratic algorithm for computing the subset partial order Paul Pritchard P.Pritchard@cit.gu.edu.au Technical Report CIT-95-04 School of Computing and Information Technology Grith University
More information1 CHAPTER 1 INTRODUCTION 1.1 Background One branch of the study of descriptive complexity aims at characterizing complexity classes according to the l
viii CONTENTS ABSTRACT IN ENGLISH ABSTRACT IN TAMIL LIST OF TABLES LIST OF FIGURES iii v ix x 1 INTRODUCTION 1 1.1 Background : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.2 Preliminaries
More informationCombining Qualitative and Quantitative. Itay Meiri y. University of California. Abstract
Combining Qualitative and Quantitative Constraints in Temporal Reasoning Itay Meiri y Cognitive Systems Laboratory Computer Science Department University of California Los Angeles, CA 90024 itay@cs.ucla.edu
More informationReasoning with Deterministic and Probabilistic graphical models Class 2: Inference in Constraint Networks Rina Dechter
Reasoning with Deterministic and Probabilistic graphical models Class 2: Inference in Constraint Networks Rina Dechter Road Map n Graphical models n Constraint networks Model n Inference n Search n Probabilistic
More informationPlan Modication versus Plan Generation: A Complexity-Theoretic Perspective. German Research Center for Articial Intelligence (DFKI)
Plan Modication versus Plan Generation: A Complexity-Theoretic Perspective Bernhard Nebel Jana Koehler German Research Center for Articial Intelligence (DFKI) Stuhlsatzenhausweg 3, D-6623 Saarbrucken,
More informationThe size of decision table can be understood in terms of both cardinality of A, denoted by card (A), and the number of equivalence classes of IND (A),
Attribute Set Decomposition of Decision Tables Dominik Slezak Warsaw University Banacha 2, 02-097 Warsaw Phone: +48 (22) 658-34-49 Fax: +48 (22) 658-34-48 Email: slezak@alfa.mimuw.edu.pl ABSTRACT: Approach
More informationBoolean Algebra and Propositional Logic
Boolean Algebra and Propositional Logic Takahiro Kato June 23, 2015 This article provides yet another characterization of Boolean algebras and, using this characterization, establishes a more direct connection
More informationsame literal in a formula), and useful equivalence-preserving operations based on anti-links are
Fast Subsumption Checks Using Anti-Links Anavai Ramesh y Intel Corporation, MS CH6-418, 5000 W. Chandler Blvd., Chandler, AZ 85226. Email: agramesh@sedona.intel.com Bernhard Beckert and Reiner Hahnle University
More informationUpper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology
More informationSearch and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012
Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:
More informationAUTOMATED REASONING. Agostino Dovier. Udine, October 2, Università di Udine CLPLAB
AUTOMATED REASONING Agostino Dovier Università di Udine CLPLAB Udine, October 2, 2017 AGOSTINO DOVIER (CLPLAB) AUTOMATED REASONING UDINE, OCTOBER 2, 2017 1 / 28 COURSE PLACEMENT International Master Degree
More informationground state degeneracy ground state energy
Searching Ground States in Ising Spin Glass Systems Steven Homer Computer Science Department Boston University Boston, MA 02215 Marcus Peinado German National Research Center for Information Technology
More informationStatic and Dynamic Structural Symmetry Breaking
Static and Dynamic Structural Symmetry Breaking Pierre Flener 1, Justin Pearson 1, Meinolf Sellmann 2, and Pascal Van Hentenryck 2 1 Dept of Information Technology, Uppsala University, Box 337, 751 05
More information2 SUMMARISING APPROXIMATE ENTAILMENT In this section we will summarise the work in (Schaerf and Cadoli 995), which denes the approximate entailment re
Computing approximate diagnoses by using approximate entailment Annette ten Teije SWI University of Amsterdam The Netherlands annette@swi.psy.uva.nl Abstract The most widely accepted models of diagnostic
More informationThe matrix approach for abstract argumentation frameworks
The matrix approach for abstract argumentation frameworks Claudette CAYROL, Yuming XU IRIT Report RR- -2015-01- -FR February 2015 Abstract The matrices and the operation of dual interchange are introduced
More informationAn exploration of matrix equilibration
An exploration of matrix equilibration Paul Liu Abstract We review three algorithms that scale the innity-norm of each row and column in a matrix to. The rst algorithm applies to unsymmetric matrices,
More informationof acceptance conditions (nite, looping and repeating) for the automata. It turns out,
Reasoning about Innite Computations Moshe Y. Vardi y IBM Almaden Research Center Pierre Wolper z Universite de Liege Abstract We investigate extensions of temporal logic by connectives dened by nite automata
More informationKnowledge Discovery. Zbigniew W. Ras. Polish Academy of Sciences, Dept. of Comp. Science, Warsaw, Poland
Handling Queries in Incomplete CKBS through Knowledge Discovery Zbigniew W. Ras University of orth Carolina, Dept. of Comp. Science, Charlotte,.C. 28223, USA Polish Academy of Sciences, Dept. of Comp.
More informationReformulation of capacitated facility location problems: How redundant information can help. Karen Aardal. Utrecht University. P.O.
Reformulation of capacitated facility location problems: How redundant information can help Karen Aardal Department of Computer Science Utrecht University P.O. Box 80089 3508 TB Utrecht, The Netherlands
More informationROYAL INSTITUTE OF TECHNOLOGY KUNGL TEKNISKA HÖGSKOLAN. Department of Signals, Sensors & Systems
The Evil of Supereciency P. Stoica B. Ottersten To appear as a Fast Communication in Signal Processing IR-S3-SB-9633 ROYAL INSTITUTE OF TECHNOLOGY Department of Signals, Sensors & Systems Signal Processing
More information2 C. A. Gunter ackground asic Domain Theory. A poset is a set D together with a binary relation v which is reexive, transitive and anti-symmetric. A s
1 THE LARGEST FIRST-ORDER-AXIOMATIZALE CARTESIAN CLOSED CATEGORY OF DOMAINS 1 June 1986 Carl A. Gunter Cambridge University Computer Laboratory, Cambridge C2 3QG, England Introduction The inspiration for
More informationDefault Reasoning and Belief Revision: A Syntax-Independent Approach. (Extended Abstract) Department of Computer Science and Engineering
Default Reasoning and Belief Revision: A Syntax-Independent Approach (Extended Abstract) Dongmo Zhang 1;2, Zhaohui Zhu 1 and Shifu Chen 2 1 Department of Computer Science and Engineering Nanjing University
More informationA Z q -Fan theorem. 1 Introduction. Frédéric Meunier December 11, 2006
A Z q -Fan theorem Frédéric Meunier December 11, 2006 Abstract In 1952, Ky Fan proved a combinatorial theorem generalizing the Borsuk-Ulam theorem stating that there is no Z 2-equivariant map from the
More informationVector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)
Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational
More informationIn this paper, we take a new approach to explaining Shostak's algorithm. We rst present a subset of the original algorithm, in particular, the subset
A Generalization of Shostak's Method for Combining Decision Procedures Clark W. Barrett, David L. Dill, and Aaron Stump Stanford University, Stanford, CA 94305, USA, http://verify.stanford.edu c Springer-Verlag
More informationConsistency restoration and explanations in dynamic CSPs Application to configuration
Artificial Intelligence 135 (2002) 199 234 Consistency restoration and explanations in dynamic CSPs Application to configuration Jérôme Amilhastre a, Hélène Fargier b,, Pierre Marquis c a Access Commerce,
More informationNORMALE SUPERIEURE. Département de Mathématiques et Informatique CNRS URA Black Box Cryptanalysis of Cryptographic.
E COLE NORMALE SUPERIEURE Black Box Cryptanalysis of Cryptographic Primitives Claus Peter SCHNORR Serge VAUDENAY LIENS - 95-28 Département de Mathématiques et Informatique CNRS URA 1327 Black Box Cryptanalysis
More informationMath 42, Discrete Mathematics
c Fall 2018 last updated 12/05/2018 at 15:47:21 For use by students in this class only; all rights reserved. Note: some prose & some tables are taken directly from Kenneth R. Rosen, and Its Applications,
More informationQuantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for en
Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for enlargements with an arbitrary state space. We show in
More information